Description
A vulnerability was determined in Tenda CH22 1.0.0.1. This impacts the function formQuickIndex of the file /goform/QuickIndex of the component Parameter Handler. This manipulation of the argument mit_linktype causes stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized.
Published: 2026-03-30
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A stack-based buffer overflow exists in the formQuickIndex function located at /goform/QuickIndex of Tenda CH22 firmware 1.0.0.1. By crafting the mit_linktype parameter, an attacker can overflow a stack buffer, potentially leading to arbitrary code execution or malicious behavior. Because the flaw is in the web interface, the attack can be performed remotely over the network that the router exposes its management interface to.

Affected Systems

Devices utilizing the Tenda CH22 router with firmware version 1.0.0.1 are affected. The vulnerability is confined to the Parameter Handler component of that firmware revision; no other Tenda products or firmware versions are listed as vulnerable.

Risk and Exploitability

The CVSS score of 8.7 indicates a high severity vulnerability, while the EPSS score of less than 1% suggests a relatively low probability of exploitation across the broader ecosystem. The flaw is publicly disclosed and exploitable remotely, but the CVE record does not specify whether authentication is required to trigger the overflow. The vulnerability is not yet included in the CISA KEV catalog, yet its potential for remote code execution warrants proactive attention.

Generated by OpenCVE AI on April 2, 2026 at 13:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the Tenda website or support portal for a firmware update that addresses the stack buffer overflow in the Parameter Handler.
  • Download and apply the latest firmware to the device following the vendor’s installation instructions.
  • Reboot the router after the firmware installation to ensure the update takes effect.
  • Verify the new firmware version to confirm the patch has been applied successfully.

Generated by OpenCVE AI on April 2, 2026 at 13:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-787
CPEs cpe:2.3:h:tenda:ch22:-:*:*:*:*:*:*:*
cpe:2.3:o:tenda:ch22_firmware:1.0.0.1:*:*:*:*:*:*:*

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Tenda ch22
Vendors & Products Tenda ch22

Tue, 31 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 31 Mar 2026 03:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in Tenda CH22 1.0.0.1. This impacts the function formQuickIndex of the file /goform/QuickIndex of the component Parameter Handler. This manipulation of the argument mit_linktype causes stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized.
Title Tenda CH22 Parameter QuickIndex formQuickIndex stack-based overflow
First Time appeared Tenda
Tenda ch22 Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:tenda:ch22_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tenda
Tenda ch22 Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tenda Ch22 Ch22 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-31T14:04:30.211Z

Reserved: 2026-03-30T13:33:15.737Z

Link: CVE-2026-5156

cve-icon Vulnrichment

Updated: 2026-03-31T14:04:22.679Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-31T00:16:15.303

Modified: 2026-04-02T12:07:05.340

Link: CVE-2026-5156

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:22:46Z

Weaknesses